MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 193bd8d7b766aa517bf1b51c36abde8f61c5941b55bfdcd1b1802d1a88aaa2e2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 193bd8d7b766aa517bf1b51c36abde8f61c5941b55bfdcd1b1802d1a88aaa2e2
SHA3-384 hash: af8b5754102b6058c5525b21d94b9dbf917c5b1c3ac4f694b568b8a91742f98c7c6dbf2cfcb50ecb8708ff8617dc0721
SHA1 hash: 48d8e45a21e46662d012164866984cb721a17227
MD5 hash: 736a1682d379c4cfb1214697a433ce31
humanhash: april-violet-social-indigo
File name:ont.sh
Download: download sample
Signature Mirai
File size:313 bytes
First seen:2025-12-05 18:20:49 UTC
Last seen:2025-12-05 22:48:06 UTC
File type: sh
MIME type:text/plain
ssdeep 6:LMFt5/rHzALKVMFt5/laLaNgBVMFt5/pFGNIvF+6iyJVMFt5/nfiAK6iwly:othfALHthlaLaNggthSNIE6iyothfLKv
TLSH T137E046FD046BDF17C1456D0AA07AE877F033D7D662A1CE069EC8A43AE1D49207233E55
Magika batch
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://213.209.143.64/splarm7d879b6d1a523fc7b10eec5dec0ebcd1b8068317a7d3633522ce439cc33f7aec Miraielf mirai ua-wget
http://213.209.143.64/splarm54c5fa8a02e9565a932998d71e214a1307efce9f619aa344771780899f5a81aae Miraielf mirai ua-wget
http://213.209.143.64/splarm62fb9451a89a7ff854b1e2669f3be8b8d0829d40165490c78daf19aad4c927bb5 Miraielf mirai ua-wget
http://213.209.143.64/splarm7bbe9f2fbdcbdbc2571b15610d4f09c1553128665024b8c87fa973a21267e5941 Miraicensys elf mirai ua-wget

Intelligence


File Origin
# of uploads :
2
# of downloads :
15
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
mirai
Verdict:
Malicious
File Type:
text
First seen:
2025-12-05T16:50:00Z UTC
Last seen:
2025-12-06T02:00:00Z UTC
Hits:
~10
Status:
terminated
Behavior Graph:
%3 guuid=0dcc3137-1e00-0000-f1e0-18b3d1090000 pid=2513 /usr/bin/sudo guuid=75608e3a-1e00-0000-f1e0-18b3d2090000 pid=2514 /tmp/sample.bin guuid=0dcc3137-1e00-0000-f1e0-18b3d1090000 pid=2513->guuid=75608e3a-1e00-0000-f1e0-18b3d2090000 pid=2514 execve guuid=6c10cf3a-1e00-0000-f1e0-18b3d3090000 pid=2515 /usr/bin/wget net send-data write-file guuid=75608e3a-1e00-0000-f1e0-18b3d2090000 pid=2514->guuid=6c10cf3a-1e00-0000-f1e0-18b3d3090000 pid=2515 execve guuid=ec179843-1e00-0000-f1e0-18b3e0090000 pid=2528 /usr/bin/chmod guuid=75608e3a-1e00-0000-f1e0-18b3d2090000 pid=2514->guuid=ec179843-1e00-0000-f1e0-18b3e0090000 pid=2528 execve guuid=811f0b44-1e00-0000-f1e0-18b3e1090000 pid=2529 /usr/bin/dash guuid=75608e3a-1e00-0000-f1e0-18b3d2090000 pid=2514->guuid=811f0b44-1e00-0000-f1e0-18b3e1090000 pid=2529 clone guuid=50262245-1e00-0000-f1e0-18b3e4090000 pid=2532 /usr/bin/wget net send-data write-file guuid=75608e3a-1e00-0000-f1e0-18b3d2090000 pid=2514->guuid=50262245-1e00-0000-f1e0-18b3e4090000 pid=2532 execve guuid=aa9a024e-1e00-0000-f1e0-18b3fa090000 pid=2554 /usr/bin/chmod guuid=75608e3a-1e00-0000-f1e0-18b3d2090000 pid=2514->guuid=aa9a024e-1e00-0000-f1e0-18b3fa090000 pid=2554 execve guuid=b93b4c4e-1e00-0000-f1e0-18b3fb090000 pid=2555 /usr/bin/dash guuid=75608e3a-1e00-0000-f1e0-18b3d2090000 pid=2514->guuid=b93b4c4e-1e00-0000-f1e0-18b3fb090000 pid=2555 clone guuid=07e9f34e-1e00-0000-f1e0-18b3fe090000 pid=2558 /usr/bin/wget net send-data write-file guuid=75608e3a-1e00-0000-f1e0-18b3d2090000 pid=2514->guuid=07e9f34e-1e00-0000-f1e0-18b3fe090000 pid=2558 execve guuid=78886b56-1e00-0000-f1e0-18b30a0a0000 pid=2570 /usr/bin/chmod guuid=75608e3a-1e00-0000-f1e0-18b3d2090000 pid=2514->guuid=78886b56-1e00-0000-f1e0-18b30a0a0000 pid=2570 execve guuid=4163c156-1e00-0000-f1e0-18b30b0a0000 pid=2571 /usr/bin/dash guuid=75608e3a-1e00-0000-f1e0-18b3d2090000 pid=2514->guuid=4163c156-1e00-0000-f1e0-18b30b0a0000 pid=2571 clone guuid=17f87357-1e00-0000-f1e0-18b30f0a0000 pid=2575 /usr/bin/wget net send-data write-file guuid=75608e3a-1e00-0000-f1e0-18b3d2090000 pid=2514->guuid=17f87357-1e00-0000-f1e0-18b30f0a0000 pid=2575 execve guuid=cd83dd5c-1e00-0000-f1e0-18b31a0a0000 pid=2586 /usr/bin/chmod guuid=75608e3a-1e00-0000-f1e0-18b3d2090000 pid=2514->guuid=cd83dd5c-1e00-0000-f1e0-18b31a0a0000 pid=2586 execve guuid=52986f5d-1e00-0000-f1e0-18b31c0a0000 pid=2588 /usr/bin/dash guuid=75608e3a-1e00-0000-f1e0-18b3d2090000 pid=2514->guuid=52986f5d-1e00-0000-f1e0-18b31c0a0000 pid=2588 clone b3bc708e-8ccc-5219-9688-8bb7f25e7035 213.209.143.64:80 guuid=6c10cf3a-1e00-0000-f1e0-18b3d3090000 pid=2515->b3bc708e-8ccc-5219-9688-8bb7f25e7035 send: 135B guuid=50262245-1e00-0000-f1e0-18b3e4090000 pid=2532->b3bc708e-8ccc-5219-9688-8bb7f25e7035 send: 136B guuid=07e9f34e-1e00-0000-f1e0-18b3fe090000 pid=2558->b3bc708e-8ccc-5219-9688-8bb7f25e7035 send: 136B guuid=17f87357-1e00-0000-f1e0-18b30f0a0000 pid=2575->b3bc708e-8ccc-5219-9688-8bb7f25e7035 send: 136B
Threat name:
Document-HTML.Trojan.Heuristic
Status:
Malicious
First seen:
2025-12-05 18:21:22 UTC
File Type:
Text (Shell)
AV detection:
10 of 37 (27.03%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 193bd8d7b766aa517bf1b51c36abde8f61c5941b55bfdcd1b1802d1a88aaa2e2

(this sample)

  
Delivery method
Distributed via web download

Comments